GDB commands to aid exploit development
☆46Sep 9, 2016Updated 9 years ago
Alternatives and similar repositories for gdb_commands
Users that are interested in gdb_commands are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆22Nov 18, 2015Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- A Golang covert backdoor using raw sockets.☆35Feb 10, 2019Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆40Mar 16, 2017Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Apr 14, 2019Updated 6 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago